Role of artificial intelligence in the Internet of Things (IoT) cybersecurity

M Kuzlu, C Fair, O Guler - Discover Internet of things, 2021 - Springer
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and
cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is …

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus… - Journal of Network and …, 2021 - Elsevier
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …

An in-depth survey of bypassing buffer overflow mitigation techniques

MA Butt, Z Ajmal, ZI Khan, M Idrees, Y Javed - Applied Sciences, 2022 - mdpi.com
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three
decades, potentially compromising any software application or system. This vulnerability …

A deep learning based static taint analysis approach for IoT software vulnerability location

W Niu, X Zhang, X Du, L Zhao, R Cao, M Guizani - Measurement, 2020 - Elsevier
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software
vulnerabilities. Reducing software defects, improving software reliability and security are …

Using artificial intelligence to integrate machine learning, fuzzy logic, and the IOT as A cybersecurity system

V Bansal, A Bhardwaj, J Singh, D Verma… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Concerns about cybersecurity have increased along with the Internet of Things'(IoT)
exponential growth in recent years. Artificial intelligence (AI), which is used to create …

VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs

Y Fan, C Wan, C Fu, L Han, H Xu - Computers & Security, 2023 - Elsevier
Code vulnerability detection has long been a critical issue due to its potential threat to
computer systems. It is imperative to detect source code vulnerabilities in software and …

Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks

TM Georgescu, B Iancu, M Zurini - Sensors, 2019 - mdpi.com
The aim of this paper was to enhance the process of diagnosing and detecting possible
vulnerabilities within an Internet of Things (IoT) system by using a named entity recognition …

A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform

NS Chahal, P Bali, PK Khosla - Computers & Security, 2022 - Elsevier
The increasing number of attacks leads to a growing research and development interest in
cybersecurity systems. As a response to the increasingly distributed nature of attacks, many …

Application of the TOPSİS method to improve software efficiency and to optimize its management

S Mahmudova - Soft Computing, 2020 - Springer
Abstract Technique for Order of Prevention by Similarity to Ideal Solution (TOPSİS) method
is used for decision-making to improve software efficiency and to optimize its management …

Binary Code Vulnerability Detection Based on Multi-Level Feature Fusion

G Wu, H Tang - IEEE Access, 2023 - ieeexplore.ieee.org
The existence of software vulnerabilities will cause serious network attacks and information
leakage problems. Timely and accurate detection of vulnerabilities in software has become …